Security Business

NOV 2018

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link:

Contents of this Issue


Page 23 of 70

November 2018 / Security Dealer & Integrator 21 format or provide the capability to integrate with existing readers. Jeff Sebek, StoneLock’s VP of Business Development, told me his customers are pushing toward “true identity” contactless authentication. For new and selected retrofit applications, higher technology cards such as those based on MIFARE DESFire offer a higher level of security. MIFARE is a series of chips widely used in contactless smart cards and proximity cards. Transmission is at the much higher 13.56 MHz frequency over distances of less than 10 cm (HID ~2 inches). Versions range from MIFARE Classic up to MIFARE DESFire EV2, reflecting evolving levels of ISO/IEC 14443 compliance, encryption (DES, 3DES, AES) and other security techniques. HID Global’s proprietary iClass protocol also employs 13.56 MHz technology. Obviously, compatible readers are required, and some are offered in a multi-protocol format. Emerging Technologies For long-range prox applications, such as vehicular access, facial recognition could be helpful – although the driver would have to get within range of the facial scanner. Alternatively, License Plate Recognition (LPR) could serve to validate the vehicle. Nedap’s Craig Wilson told me their in-vehicle Prox Booster 2G product can add a second factor of personal authentication to the card credential and is identified up to 33 feet away. Finally, smartphones can offer fingerprint and facial biometrics in conjunction with the phone as “something you have” for a more secure multi-factor solution. These approaches offered varied opportunities for integrators and consultants to provide more secure identification and access solutions as the lack of security in the legacy “tried-and-true” prox card becomes more impactful. “The good news is this should really help all of us explain the need for technology upgrades,” says Dean Forchas of HID Global. With opportunity, though, comes responsibility. Understand your liability if offering potentially insecure technology or systems. Program the access control system to flag the use of the same card with readers in disparate locations. And integrators should make system administrators of risks, encouraging strong policies dealing with duplication and reasonable use. ■ » Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at, or contact him at or on Twitter: @RayCoulombe. comnet Communication Networks The Shortest Distance Between Two Points Your Transmission Challenge has always been Getting Your Audio, Video, Data and Ethernet Signals from Here to There. ComNet is Your Solution for Fiber Optic, Copper and Wireless Transmission The transmission products you choose today will affect how well your network performs tomorrow. ComNet offers the most comprehensive line of products designed to solve every transmission challenge. Made in the USA Lifetime Warranty View the Full Product Line at and Identify the Fiber Optic, Copper or Wireless Connectivity Solution for your Application Contact the ComNet Design Center Now for Free Design Assistance. Call 1-888-678-9427 or 1-203-796-5300 or email Visit Email Phone 1-203-796-5300 Toll Free 1-888-678-9427 Visit us at ISC East 2018 | New York, NY | Booth 718 | 14-15 November Request information:

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Business - NOV 2018